Types Of Malware.
1. Viruses
The primary characteristic that a piece of software must possess to qualify as a virus is an urge to reproduce that is programmed into it. This mechanism means that this type of malware will distribute copies of itself, using any means to spread.
They hide within computer files, and the computer must run that file (execute that code, in other words) for a virus to do its dirty functions.
1a. System or boot infectors
A virus
can infect a system as a resident virus by installing itself as part of the operating system.
2a. File infectors
Many viruses sneak up into ordinary executable files like .EXE and .COM in order to up their chances of being run by a user. Programs including batch files and script files like .BAT, .JS. .VB, and .SCR extension is susceptible.
3a. Macro viruses
These kinds of viruses are the ones that run inside specific application files that allow macro programs in order to extend the capabilities of a given software.
Some infamous examples of viruses over the years are the Concept virus, the Chernobyl virus (also known as CIH), the Anna Kournikova virus, Brain and RavMonE.exe.
2. Worms
The second of the two kinds of infectious malware. A worm is a standalone software that replicates without targeting and infecting specific files that are already present on a computer. They usually target the operating system files and work until the drive they are in becomes empty.
Basically, whereas viruses add themselves inside existing files, worms carry themselves in their own containers.
Computer worms usually show up via email and instant messages. They use a computer network to spread.
3. Trojan Horses
A Trojan is a malicious program that misrepresents itself to appear as a legitimate program. The term is derived from the Ancient Greek story of the wooden horse that was used to invade the city of Troy by stealth — these are just as deadly on computers.
Trojan horse payload is usually a backdoor that allows attackers to gain access to the infected computer. Trojans also give cybercriminals access to the personal information of a user like IP addresses, passwords and banking details.
Trojan horse is now considered to be the most dangerous of all malicious program, particularly the ones that are designed to gain access and steal sensitive information from the victim’s computer.
4. Rootkits
A rootkit is a collection of software specifically designed to permit malicious program that gathers sensitive information, into your system.
These software work like a back door for different types of malware to enter and gain access, and are now being used extensively by hackers to infect systems.
The root access in other words.
Detecting and removing a rootkit is difficult — more so in cases where the rootkit resides inside the kernel of an operating system. Reinstalling the operating systems is often the only solution to protect your PC.
5. Ransomware
The most devastating type of malicious programs, by some counts. Definitely one of the most advanced and constantly on the rise these days. Ransomware blocks access to the data of a victim, threatening to either publish it or delete it until a ransom is paid. Worse yet, there is no guarantee that paying a ransom will return access to the data, or prevent it from deletion. Usually, ransomware uses phishing to spread.
This manner of digital extortion has been in play since the late 80s, it returned to prominence in late 2013 with the advent of digital currency that is used to collect the ransom money.
6. Keyloggers
Software that records all the data that is typed using a keyboard. Keyloggers usually are not capable of recording information that is entered using virtual keyboards and other input devices, but physical keyboards are at risk with this type of malware.
Keyloggers store the gathered data and send it to the attacker, who can then extract sensitive data like username and passwords as well as credit card details.
7. Grayware
Grayware is a recently coined term that came into use around 2004. It is used to describe unwanted applications and files that though are not classified as a malicious program, can worsen the performance of computers and lead to security risks.
Grayware alludes to both adware and spyware. Almost all commercially available security software can detect these potentially unwanted programs.
7a. Adware
Although ad-supported software is now much more common types and known as adware in some circles, the word has been linked to malicious program for quite some time. While adware can refer to any program that is supported by advertising, malicious adware usually shows advertisements in the form of popups and windows.
It is perhaps the most lucrative and least harmful malware, designed with the specific purpose of displaying advertisements on your computer.
7b. Spyware
Spyware, as the name gives away, is software that constantly spies on you. Its main purpose is to keep track of your Internet activity in order to send adware. Spyware is also used to gather sensitive information about an organization without their knowledge, and send that data to another entity, without consent of the victim.